Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08d34547344264cd1f823c2934b923bdeb73003c477c0660be9335f290be1e03.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
08d34547344264cd1f823c2934b923bdeb73003c477c0660be9335f290be1e03.dll
-
Size
124KB
-
MD5
456dc12c3ea6e4e6e74d00e92ebf9fe2
-
SHA1
192a89c1a6cb54b28de53bfbfcb59ab18b606b78
-
SHA256
08d34547344264cd1f823c2934b923bdeb73003c477c0660be9335f290be1e03
-
SHA512
33886d9d2de0505c0c4a4ab9cfb273ce29de8ca8f1356a7e08c8717f0ce3eb4a955bf6101bfbb0f6e7c66c497456e0e8e381fd8be82a55cf1d78805822efec95
-
SSDEEP
3072:pJzP5D8ndJY9IfgjgxT0vO5ym7ZBT5+P+xrOKR1Q:vNDidOqT0vMP745KR1
Malware Config
Extracted
Family
strela
C2
45.9.74.32
Attributes
-
url_path
/out.php
-
user_agent
Mozilla/4.0 (compatible)
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2744-0-0x00000190E9C90000-0x00000190E9CB2000-memory.dmp family_strela behavioral1/memory/2744-1-0x00000190E9C90000-0x00000190E9CB2000-memory.dmp family_strela